UBUNTU-CVE-2023-6195

Source
https://ubuntu.com/security/CVE-2023-6195
Import Source
https://github.com/canonical/ubuntu-security-notices/blob/main/osv/cve/2023/UBUNTU-CVE-2023-6195.json
JSON Data
https://api.osv.dev/v1/vulns/UBUNTU-CVE-2023-6195
Upstream
Published
2025-01-31T00:15:00Z
Modified
2025-09-08T16:55:59Z
Severity
  • 2.6 (Low) CVSS_V3 - CVSS:3.1/AV:N/AC:H/PR:L/UI:R/S:U/C:L/I:N/A:N CVSS Calculator
  • 4.3 (Medium) CVSS_V3 - CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:N CVSS Calculator
  • Ubuntu - medium
Summary
[none]
Details

An issue has been discovered in GitLab CE/EE affecting all versions starting from 15.5 prior to 16.9.7, starting from 16.10 prior to 16.10.5, and starting from 16.11 prior to 16.11.2. GitLab was vulnerable to Server Side Request Forgery when an attacker uses a malicious URL in the markdown image value when importing a GitHub repository.

References

Affected packages

Ubuntu:Pro:16.04:LTS / gitlab

Package

Name
gitlab
Purl
pkg:deb/ubuntu/gitlab@8.5.8+dfsg-5?arch=source&distro=esm-apps/xenial

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected

Affected versions

8.*

8.4.3+dfsg-9
8.4.3+dfsg-12
8.5.8+dfsg-5

Ecosystem specific

{
    "binaries": [
        {
            "binary_version": "8.5.8+dfsg-5",
            "binary_name": "gitlab"
        }
    ]
}